Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

HPE6-A78 Exam Dumps - Aruba Certified Network Security Associate Exam

Go to page:
Question # 33

A company has HPE Aruba Networking Mobility Controllers (MCs), campus APs, and AOS-CX switches. The company plans to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other HPE Aruba Networking ClearPass solutions.

The HPE Aruba Networking ClearPass admins tell you that they want to use HTTP User-Agent strings to help profile the endpoints.

What should you do as a part of setting up Mobility Controllers (MCs) to support this requirement?

A.

Create datapath mirrors that use the CPPM's IP address as the destination.

B.

Create an IF-MAP profile, which specifies credentials for an API admin account on CPPM.

C.

Create control path mirrors to mirror HTTP traffic from clients to CPPM.

D.

Create a firewall whitelist rule that permits HTTP and CPPM's IP address.

Full Access
Question # 34

An ArubaOS-CX switch enforces 802.1X on a port. No fan-through options or port-access roles are configured on the port The 802 1X supplicant on a connected client has not yet completed authentication

Which type of traffic does the authenticator accept from the client?

A.

EAP only

B.

DHCP, DNS and RADIUS only

C.

RADIUS only

D.

DHCP, DNS, and EAP only

Full Access
Question # 35

Which is an accurate description of a type of malware?

A.

Worms are usually delivered in spear-phishing attacks and require users to open and run a file.

B.

Rootkits can help hackers gain elevated access to a system and often actively conceal themselves from detection.

C.

A Trojan is any type of malware that replicates itself and spreads to other systems automatically.

D.

Malvertising can only infect a system if the user encounters the malware on an untrustworthy site.

Full Access
Question # 36

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial or service attack (DoS)?

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices

B.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device

C.

A DoS attack targets one server, a DDoS attack targets all the clients that use a server

D.

A DDoS attack targets multiple devices, while a DoS Is designed to Incapacitate only one device

Full Access
Question # 37

You have an AOS-8 architecture, consisting of a Mobility Conductor (MC) and Mobility Controllers (MCs). You want to monitor wireless clients’ application usage in the Traffic Analysis dashboard. What is a requirement?

A.

Configuring packet capturing on the MCs’ data plane

B.

Enabling logging on the users category on the MCs

C.

Discovering the mobility devices in HPE Aruba Networking Central

D.

Enabling firewall visibility and deep packet inspection (DPI) on the MCs

Full Access
Question # 38

A company has an AOS controller-based solution with a WPA3-Enterprise WLAN, which authenticates wireless clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company has decided to use digital certificates for authentication. A user's Windows domain computer has had certificates installed on it. However, the Networks and Connections window shows that authentication has failed for the user. The Mobility Controller’s (MC's) RADIUS events show that it is receiving Access-Rejects for the authentication attempt.

What is one place that you can look for deeper insight into why this authentication attempt is failing?

A.

The reports generated by HPE Aruba Networking ClearPass Insight

B.

The RADIUS events within the CPPM Event Viewer

C.

The Alerts tab in the authentication record in CPPM Access Tracker

D.

The packets captured on the MC control plane destined to UDP 1812

Full Access
Question # 39

What is symmetric encryption?

A.

It simultaneously creates ciphertext and a same-size MAC.

B.

It any form of encryption mat ensures that thee ciphertext Is the same length as the plaintext.

C.

It uses the same key to encrypt plaintext as to decrypt ciphertext.

D.

It uses a Key that is double the size of the message which it encrypts.

Full Access
Question # 40

What is one benefit of enabling Enhanced Secure mode on an ArubaOS-Switch?

A.

Control Plane policing rate limits edge ports to mitigate DoS attacks on network servers.

B.

A self-signed certificate is automatically added to the switch trusted platform module (TPM).

C.

Insecure algorithms for protocol such as SSH are automatically disabled.

D.

All interfaces have 802.1X authentication enabled on them by default.

Full Access
Go to page: